Essays about: "auditing security"
Showing result 1 - 5 of 15 essays containing the words auditing security.
-
1. A study of Oracle Cloud Infrastructure : Demonstration of the vulnerability or reliability of certain services through penetration attacks
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This thesis aims to assess the security of Oracle Cloud Infrastructure (OCI) through penetration testing of some of its services. Targeted at cloud, cybersecurity, governance, and compliance professionals as well as administrators or cyber enthusiasts in general, this research uncovers specific best practices to OCI. READ MORE
-
2. Internal Auditing in a digitalised world : A qualitative study about the internal auditor´s approach in providing assurance of cybersecurity
University essay from Uppsala universitet/Företagsekonomiska institutionenAbstract : This study aims to contribute to internal auditing´s body of knowledge. This will be done by identifying and evaluating the approaches taken by internal auditors in assuring in the management of an organisation's cybersecurity. Qualitative research has been undertaken for this study by collecting data through semistructured interviews. READ MORE
-
3. Keeping an Indefinitely Growing Audit Log
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : An audit log enables us to discover malfeasance in a system and to understand a security breach after it has happened. An audit log is meant to preserve information about important events in a system in a non-repudiable manner. Naturally, the audit log is often a target for malicious actors trying to cover the traces of an attack. READ MORE
-
4. Analysing privacy concerns in smartcameras : in correlation with GDPR and Privacy by Design
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. The right to privacy is every persons right, data regulation laws suchas the GDPR and privacy preserving concepts like Privacy by Design (PbD) aid inthis matter. IoT devices are highly vulnerable to attacks because of their limitedstorage and processing capabilities, even more so for internet connected cameras. READ MORE
-
5. SHARIF: Solid Pod based Secured Healthcare Information Storage and Exchange Solution
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : Health Informatics has enlightened by the recent development in the internet of medical things 4.0. READ MORE